A system for secure booting of an information handling system stores a root of trust private key in a hardware security module (HSM). A HSM-Integrated certificate creation utility receives inputs such as bin files for each firmware volume associated with a boot sequence. The HSM-Integrated certificate creation utility loads the correct extensions for the firmware volume, generates a certificate signing request (csr) and generates a certificate based on the csr. The certificates can be provided to a boot sequence for processing in a trusted firmware implementation without a certificate creation utility consuming the hardware root of trust private key as a file that could be compromised.
|
6. A system for secure booting of an information handling system, the system comprising:
a hardware security module (HSM) storing a root of trust private key; and
a hardware security module-Integrated certificate creation utility comprising instructions executable to:
determine, from a plurality of firmware volumes, a set of firmware volumes associated with a boot sequence;
for each firmware volume in the set of firmware volumes:
load information associated with a certificate for the firmware volume;
generate a script for a certificate signing Request (csr);
generate the csr;
generate a certificate based on the csr; and
store the certificate.
1. A method for generating a set of certificates for secure booting of an information handling system, the method comprising:
storing, in a hardware security module, a hardware root of trust private key;
for each firmware volume:
loading information associated with a certificate for the firmware volume into a hardware security module (HSM)-Integrated certificate creation utility;
generating, by a script generating engine executing in the (HSM)-Integrated certificate creation utility, a script for generating a certificate signing Request (csr);
generating, by a csr engine executing in the (HSM)-Integrated certificate creation utility, the csr; and
generating, by a certificate creation engine executing in the (HSM)-Integrated certificate creation utility, a certificate based on the csr.
11. An information handling system, comprising:
a processor subsystem;
a memory subsystem comprising a plurality of firmware volumes; and
a system for secure booting of the information handling system, the system comprising:
a hardware security module (HSM) storing a root of trust private key; and
a hardware security module-Integrated certificate creation utility comprising instructions executable to:
determine, from the plurality of firmware volumes, a set of firmware volumes associated with a boot sequence;
for each firmware volume in the set of firmware volumes:
load information associated with a certificate for the firmware volume;
generate a script for a certificate signing Request (csr);
generate the csr;
generate a certificate based on the csr; and
store the certificate.
2. The method of
3. The method of
4. The method of
5. The method of
7. The system of
8. The system of
9. The system of
10. The system of
12. The information handling system of
13. The information handling system of
14. The information handling system of
15. The information handling system of
|
This disclosure relates generally to security for information handling systems and, more particularly, to systems for securing a chain of trust (CoT) for multi-stage bootloaders.
As the value and use of information continues to increase, individuals and businesses seek additional ways to process and store information. One option available to users is information handling systems. An information handling system generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes thereby allowing users to take advantage of the value of the information. Because technology and information handling needs and requirements vary between different users or applications, information handling systems may also vary regarding what information is handled, how the information is handled, how much information is processed, stored, or communicated, and how quickly and efficiently the information may be processed, stored, or communicated. The variations in information handling systems allow for information handling systems to be general or configured for a specific user or specific use such as financial transaction processing, airline reservations, enterprise data storage, or global communications. In addition, information handling systems may include a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems.
Security of a platform during booting is a concern. As part of a secure boot process, the platform validates the integrity and authenticity of each firmware before the firmware runs. One approach to this issue is the ARM Trusted Firmware (ATF) implementation, and specifically the Trusted Board Boot Requirements (TBBR) interface. Part of the Trusted Board Boot is to maintain a chain of trust (CoT) among multi-stage bootloaders.
Embodiments disclosed herein may be generally directed to systems and methods for securing information handling systems by preventing malicious firmware from interfering with a multi-stage bootloader.
Embodiments integrate the hardware security module (HSM) in the generation of the CoT certificates, as opposed to existing approaches that require the private key to exist as a file on the File System. HSM utilization ensures cryptographic keys remain tamper-proof, which ensures the integrity and authenticity of firmware and software.
Embodiments disclosed herein may be directed to a system and method for enforcing a chain of trust (CoT) using standardized certificates. The custom extensions to the certificates store information for the CoT.
For a more complete understanding of the invention and its features and advantages, reference is now made to the following description, taken in conjunction with the accompanying drawings, in which:
In the following description, details are set forth by way of example to facilitate discussion of the disclosed subject matter. It should be apparent to a person of ordinary skill in the field, however, that the disclosed embodiments are exemplary and not exhaustive of all possible embodiments.
As used herein, a hyphenated form of a reference numeral refers to a specific instance of an element and the un-hyphenated form of the reference numeral refers to the collective or generic element. Thus, for example, certificate “40-1” refers to an instance of an input certificate, which may be referred to collectively as certificates “40” and any one of which may be referred to generically as certificate “40.”
For the purposes of this disclosure, an information handling system may include an instrumentality or aggregate of instrumentalities operable to compute, classify, process, transmit, receive, retrieve, originate, switch, store, display, manifest, detect, record, reproduce, handle, or utilize various forms of information, intelligence, or data for business, scientific, control, entertainment, or other purposes. For example, an information handling system may be a personal computer, a consumer electronic device, a network storage device, or another suitable device and may vary in size, shape, performance, functionality, and price. The information handling system may include memory, one or more processing resources such as a central processing unit (CPU) or hardware or software control logic. Additional components of the information handling system may include one or more storage devices, one or more communications ports for communicating with external devices as well as various input and output (I/O) devices, such as a keyboard, a mouse, and one or more video displays. The information handling system may also include one or more buses operable to transmit communication between the various hardware components.
Embodiments disclosed herein include an information handling system with a hardware security module for maintaining a chain of trust for a boot sequence.
Embodiments disclosed herein are described with respect to a boot sequence involving firmware blocks or bootloaders (e.g., BL1, BL2 and BL31) associated with multi-stage booting to a BIOS but may also be practiced with other multi-stage boot sequences. Particular embodiments are best understood by reference to
Turning to the drawings,
As shown in
Chain of Trust
Part of the Trusted Board Boot (TBB) is to maintain a Chain of Trust (CoT) among the multi-stage firmware volumes 12 as shown in
Hardware Root of Trust (HWROT) 30 is used as a basis to create multiple certificates 40, wherein each certificate 40 comprises a subject public key 42, a set of extensions 44 and a signature 46. Each certificate 40 may be an x.509 v3 certificate used for Transport Layer Security (TLS)/Secure Socket Layer (SSL) communications.
When trusted key certificate 40-1 is generated, a certificate creation utility (discussed below) consumes HWROT 30 to generate subject public key 42-1. Certificate 40-1 further comprises extensions 44 including Non-Volatile (NV) counter 44-1, Trusted World Key hash 44-2 and non-trusted world key hash 44-3. Signature 46-1 for trusted key certificate 40-1 is signed with Hardware Root of Trust (HWROT) key 30.
When BL2 key certificate 40-2 is created, the certificate creation utility uses trusted world key hash 44-2 from trusted key certificate 40-1 as subject public key 42-2. BL2 key certificate 40-2 further comprises extensions 44 including NV counter 44-1 and BL31 public key hash 44-4. Signature 46-2 for BL2 key certificate 40-2 is signed with Trusted World Key.
When BL31 content certificate 40-3 is created, the certificate creation utility uses BL31 public key 44-4 as subject public key 42-3. BL31 content certificate 40-3 further comprises extensions 44 including NV counter 44-1 and a hash of BL31 44-5. Signature 46-3 for BL31 content certificate is signed with BL31 Key.
As depicted in
Certificate Creation Utility Compromises Security of Hardware Root of Trust Private Key
For example, referring to the boot sequence 100 depicted in
Accessibility of the Private Key Presents Security Risks
The consumption of Hardware Root of Trust Private Key 30 by certificate creation utility 302 in a file form poses a significant security risk. If Hardware Root of Trust Private Key 30 is compromised, it could be used to attack the information handling system.
Embodiments provide a more secure approach that still operate within the ARM TBBR by avoiding the use of the root of trust private key 30 as a file.
System for Generating Certificates Using an HSM-Integrated Certificate Creation Utility
Certificate generation system 500 may receive inputs including BL2 bin file 304-1, BL31 bin file 304-2, and BL33 bin file 304-3 and generate a set of certificates 502 including Non-Trusted Firmware Content Certificate 502-1, Non-Trusted Firmware Key Certificate 502-2, SOC Firmware Key Certificate 502-3, SOC Firmware Content Certificate 502-4, Trusted Key Certificate 502-5 and Trusted Boot Firmware Certificate 502-6.
Certificate generation system 500 may include HSM 400 storing Hardware Root of Trust private key 30 and other keys 508 for generating certificate 40. Certificate generation system 500 further includes HSM integration memory 402 storing engines 510 as well as algorithms such as encryption and decryption algorithms and instructions. For example, HSM integration memory 402 may store algorithms and instructions for generating OpenSSL commands described herein.
Certificate generation system 500 may receive BL2 bin file 304-1 containing information associated with BL2 firmware volume 12-2. CSR script engine 510-1 in HSM integration memory 402 may use the information to generate a certificate signing request (CSR) for BL2 firmware volume 12-2. CSR generation engine 510-2 in HSM integration memory 402 such as an OpenSSL gem engine may generate the CSR. CSR verification engine 510-3 may verify the CSR is valid. Certificate generation engine 510-4 may generate a certificate 502 based on the CSR and sign the certificate 502. Signing the certificate 502 may include verifying the certificate 502 is valid. Certificate verification engine 510-5 may verify the certificate. HSM 400 may store Hardware Root of Trust key 30 and other keys 508 including BL33 key 508-1, BL31 key 508-2, Non-trusted World Key 508-3 and Trusted World Key 508-4. Other keys 508 (not shown) may be stored in HSM 400 as well.
The method may begin once a boot sequence is determined. At step 602, embodiments may identify a firmware volume 12 and load information that will be included in a file extension 44 for the firmware volume 12.
At step 604, embodiments generate a script that will be used for generating a Certificate Signing Request (CSR) for the firmware volume. In some embodiments, a template may be used to compose a script. In some embodiments, a script may be an OpenSSL script, wherein (HSM)-Integrated certificate creation utility 402 may populate the script with information received from a bin file 304.
At step 606, embodiments create a CSR using an engine connected to HSM 400. In some embodiments, an engine may be an OpenSSL gem engine. In some embodiments, (HSM)-Integrated certificate creation utility 402 may include instructions to run a command to create a CSR. For example, an OpenSSL command may be: openssl req -new -newkey rsa:2048 -nodes -out request.car -keyout private.key. Parameters such as “-x509”, “-sha256” and “days” are not included. At step 608, embodiments determine if the CSR was successful. In some embodiments, (HSM)-Integrated certificate creation utility 402 may include instructions to run a command to verify a CSR is correct. For example, an OpenSSL command may be: openssl req -in request.csr -text -noout -verify.
If the CSR was successful, embodiments create a certificate at step 610. An example command to generate a certificate may be: openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:4096 -keyout private.key -out certificates.cert, wherein “req” is a command for creating a certificate creation request, “-x509” allows OpenSSL to sign the certificate 40, “-sha256” is the hash algorithm used to encrypt the certificate 40, “-nodes” is a command for no DES such that the private key is not password protected, “-days” is the number of days certificate 40 is valid, “-newkey” is the format (e.g. an RSA key with 4096 bit encryption), “-keyout” is the location to store the private key and “-out” is the location to output certificate 40.
At step 612, embodiments determine if the certificate was successful. An example command to verify certificate 40 is correct may be: openssl x509 -in certificate.crt -text -noout, wherein “x509” is combined with other parameters to retrieve information about certificate 40, “-in” is used to identify which certificate 40 is being verified, “-text” strips text headers from the output and “-noout” specifies to not output the encoded version of certificate 40.
If the certificate was generated successfully, then at step 614, embodiments determine if all certificates 40 have been generated. If there are more certificates to be generated, embodiments repeat steps 602-614 until all certificates are created and verified.
If all certificates 40 have been generated, then at step 616, the certificates may be processed as part of an ARM trusted firmware implementation.
If a CSR was not successful or the certificate was not generated successfully, embodiments report and log the error at step 618 and method 600 stops.
Embodiments may be used for secure booting of an information handling system. The information handling system comprises a processor subsystem comprising a system, device, or apparatus operable to interpret and execute program instructions and process data, and may include a microprocessor, microcontroller, digital signal processor (DSP), application specific integrated circuit (ASIC), or another digital or analog circuitry configured to interpret and execute program instructions and process data. In some embodiments, a processor subsystem may interpret and execute program instructions and process data stored on firmware volumes 12 or stored locally (e.g., in a memory subsystem). In the same or alternative embodiments, processor subsystem may interpret and execute program instructions and process data stored remotely (e.g., in a network storage resource).
An information handling system comprises a memory subsystem comprising a system, device, or apparatus operable to retain and retrieve program instructions and data for a period of time (e.g., computer-readable media). A memory subsystem may comprise random access memory (RAM), electrically erasable programmable read-only memory (EEPROM), a PCMCIA card, flash memory, magnetic storage, opto-magnetic storage, and/or a suitable selection and/or array of volatile or non-volatile memory that retains data after power to its associated information handling system is powered down.
An information handling system may have an I/O subsystem comprising a system, device, or apparatus generally operable to receive and transmit data to or from or within an information handling system. An I/O subsystem may represent, for example, a variety of communication interfaces, graphics interfaces, video interfaces, user input interfaces, and peripheral interfaces. In various embodiments, an I/O subsystem may be used to support various peripheral devices, such as a touch panel, a display adapter, a keyboard, a touch pad, or a camera, among other examples. In some implementations, an I/O subsystem may support so-called ‘plug and play’ connectivity to external devices, in which the external devices may be added or removed while information handling system 100 is operating.
An information handling system may have a local storage resource comprising computer-readable media (e.g., hard disk drive, floppy disk drive, CD-ROM, and other type of rotating storage media, flash memory, EEPROM, or another type of solid-state storage media) and may be generally operable to store instructions and data.
An information handling system may have a network interface comprising a system, apparatus, or device operable to serve as an interface between an information handling system and a network (not shown). A network interface 22 may enable information handling system to communicate over a network using a suitable transmission protocol or standard. In some embodiments, a network interface may be communicatively coupled via a network to a network storage resource (not shown). A network coupled to a network interface may be implemented as, or may be a part of, a storage area network (SAN), personal area network (PAN), local area network (LAN), a metropolitan area network (MAN), a wide area network (WAN), a wireless local area network (WLAN), a virtual private network (VPN), an intranet, the Internet or another appropriate architecture or system that facilitates the communication of signals, data and messages (generally referred to as data). A network interface may transmit data using a desired storage or communication protocol, including, but not limited to, Fibre Channel, Frame Relay, Asynchronous Transfer Mode (ATM), Internet protocol (IP), other packet-based protocol, small computer system interface (SCSI), Internet SCSI (iSCSI), Serial Attached SCSI (SAS) or another transport that operates with the SCSI protocol, advanced technology attachment (ATA), serial ATA (SATA), advanced technology attachment packet interface (ATAPI), serial storage architecture (SSA), integrated drive electronics (IDE), or any combination thereof. A network interface or various components associated therewith may be implemented using hardware, software, or any combination thereof.
Embodiments disclosed herein may provide a more secure boot process for an information handling system while maintaining the ARM standards. Certificates necessary to boot an information handling system in an ATF implementation can be generated without handling the Root of Trust private key in file form.
The above disclosed subject matter is to be considered illustrative, and not restrictive, and the appended claims are intended to cover all such modifications, enhancements, and other embodiments which fall within the true spirit and scope of the disclosure. Thus, to the maximum extent allowed by law, the scope of the disclosure is to be determined by the broadest permissible interpretation of the following claims and their equivalents, and shall not be restricted or limited by the foregoing detailed description.
Campetti, Christopher, Fontes, Antonio L., Xie, Huijun, Tannous, Azzam, Gulati, Anoop
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
10263789, | Mar 28 2016 | Amazon Technologies, Inc | Auto-generation of security certificate |
20210103661, | |||
20210397716, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jul 28 2021 | GULATI, ANOOP | Dell Products L P | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 057020 | /0603 | |
Jul 28 2021 | TANNOUS, AZZAM | Dell Products L P | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 057020 | /0603 | |
Jul 28 2021 | FONTES, ANTONIO L | Dell Products L P | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 057020 | /0603 | |
Jul 28 2021 | XIE, HUIJUN | Dell Products L P | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 057020 | /0603 | |
Jul 28 2021 | CAMPETTI, CHRISTOPHER | Dell Products L P | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 057020 | /0603 | |
Jul 29 2021 | Dell Products L.P. | (assignment on the face of the patent) | / | |||
Sep 08 2021 | Dell Products L P | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 057758 | /0286 | |
Sep 08 2021 | EMC IP HOLDING COMPANY LLC | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 057758 | /0286 | |
Oct 01 2021 | EMC IP HOLDING COMPANY LLC | Credit Suisse AG, Cayman Islands Branch | SECURITY AGREEMENT | 057682 | /0830 | |
Oct 01 2021 | DELL PRODUCTS, L P | Credit Suisse AG, Cayman Islands Branch | SECURITY AGREEMENT | 057682 | /0830 | |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | EMC IP HOLDING COMPANY LLC | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 057758 0286 | 061654 | /0064 | |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | EMC IP HOLDING COMPANY LLC | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 058014 0560 | 062022 | /0473 | |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | Dell Products L P | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 058014 0560 | 062022 | /0473 | |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | Dell Products L P | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 057758 0286 | 061654 | /0064 | |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | Dell Products L P | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 057931 0392 | 062022 | /0382 | |
Mar 29 2022 | THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENT | EMC IP HOLDING COMPANY LLC | RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 057931 0392 | 062022 | /0382 |
Date | Maintenance Fee Events |
Jul 29 2021 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Date | Maintenance Schedule |
Sep 05 2026 | 4 years fee payment window open |
Mar 05 2027 | 6 months grace period start (w surcharge) |
Sep 05 2027 | patent expiry (for year 4) |
Sep 05 2029 | 2 years to revive unintentionally abandoned end. (for year 4) |
Sep 05 2030 | 8 years fee payment window open |
Mar 05 2031 | 6 months grace period start (w surcharge) |
Sep 05 2031 | patent expiry (for year 8) |
Sep 05 2033 | 2 years to revive unintentionally abandoned end. (for year 8) |
Sep 05 2034 | 12 years fee payment window open |
Mar 05 2035 | 6 months grace period start (w surcharge) |
Sep 05 2035 | patent expiry (for year 12) |
Sep 05 2037 | 2 years to revive unintentionally abandoned end. (for year 12) |